Abstract is missing.
- An Adaptive Energy Saving Mechanism for Middleware of ThingsDavid Cavalcanti 0001, Danny Hughes 0001, Nelson S. Rosa. 1-6 [doi]
- Time Series LSTM Prediction of Water Consumption in the Republic of Croatia by RegionsTea Polic, Alan Mutka, Martin Zagar. 1-6 [doi]
- A Novel QoE Indicator for Mobile Networks based on Twitter Opinion RankingMarcelo Rodrigo dos Santos, Demóstenes Zegarra Rodríguez, Renata Lopes Rosa. 1-6 [doi]
- How Large Is the Gap? Exploring MANRS and ISO27001 Security ManagementJan Marius Evang, Ioana Livadariu. 1-6 [doi]
- Automatic Detection of Peak Spatial-Average Power Density on Nonplanar Body ModelsAnte Lojic Kapetanovic, Dragan Poljak, Hrvoje Dodig. 1-5 [doi]
- Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital TwinsFatemeh Akbarian, William Tärneberg, Emma Fitzgerald, Maria Kihl. 1-6 [doi]
- Ant Colony Algorithms Application for Telco Networks Performance with Multi-criteria OptimizationMichal Berlinski, Mateusz Rasmus, Zbigniew Kopertowski, Stanislaw Kozdrowski. 1-3 [doi]
- Performance Evaluation of QUIC Vs. TCP for Cloud Control SystemsHaorui Peng, William Tärneberg, Emma Fitzgerald, Maria Kihl. 1-6 [doi]
- Automation Improvement in Cyber Risk ManagementKire Jakimoski. 1-6 [doi]
- Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 VulnerabilitiesArtur Balsam, Michal Walkowski, Maciej Roman Nowak, Jacek Oko, Slawomir Sujecki. 1-3 [doi]
- Spectrum Occupancy Detection Supported by Federated LearningLukasz Kulacz. 1-3 [doi]
- Development of a New Dynamic Approach for Facial Recognition and Emotion DetectionHadil Ben Amor, Seifeddine Bouallegue, Afef Bohli, Ridha Bouallegue. 1-6 [doi]
- Analysis of Client Link Utilization for DWDM Networks as a Function of TimeBartlomiej Piotr Grzelak, Slawomir Sujecki, Stanislaw Kozdrowski, Piotr Sliwka. 1-3 [doi]
- Analysis of Student Behaviour on Large Learning Management SystemsLars Mehnen, Thomas Mandl 0004, Birgit Pohn, Matthias Blaickner, Isabel Dregely. 1-6 [doi]
- Detection of Small Fruits in Natural Environment ImagesMirela Kundid Vasic, Josip Gugic, Vladan Papic. 1-6 [doi]
- Empirical Comparison of Face Verification Algorithms from UAVsJulio Diez-Tomillo, Jose M. Alcaraz Calero, Qi Wang 0001. 1-6 [doi]
- CD and CDC Technologies in Next-generation Optical NetworksStanislaw Kozdrowski, Pawel Krysztofik. 1-3 [doi]
- Soybean Disease Detection by Deep Learning AlgorithmsOluwatoyin Joy Omole, Renata Lopes Rosa, Demóstenes Zegarra Rodríguez. 1-5 [doi]
- Visual Query System Based on Conceptual Graphs for Apache CassandraCamelia-Florina Andor, Andrei Buiciuc. 1-6 [doi]
- LoRaMeter: Signal Mapping in LoRa NetworksJulian Zobel, Paul Frommelt, Lukas Laufenberg, Régis Fayard, Lukas Wehrstein, Ralf Kundel, Ralf Steinmetz. 1-6 [doi]
- An Efficient Hierarchical LSTM-based Framework for Intrusion Detection in Internet of Things (IoT) SystemsAbdelhammid Bouazza, Hichem Debbi, Hicham Lakhlef, Abdelkarim Smaili. 1-6 [doi]
- Securing Cyber-Physical Systems Against GPS Spoofing Attacks Using Confidence AttributionMatheus Wagner, Antônio Augusto Fröhlich. 1-6 [doi]
- RiskControl: A Bayesian Network-based Tool to Support Risk Management in Software ProjectsEmanuel Dantas, Ademar França de Sousa Neto, Thiago Rique, Luiz Antônio, Danyllo Albuquerque, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich. 1-6 [doi]
- Adaptive Timers and Buffer Optimization for Layer-2 Protocols in 5G Non-Terrestrial NetworksChandan Kumar Sheemar, Sumit Kumar 0001, Jorge Querol, Symeon Chatzinotas. 1-6 [doi]
- Detection of at-risk Students in Virtual Learning EnvironmentRobert Rozic, Hrvoje Ljubic, Tamara Grujic, Ana Kuzmanic Skelin. 1-6 [doi]
- tSIP: A Lightweight SIP-Based Messaging Protocol for Resource-Constrained Embedded DevicesHaytham Khalil, Khalid Elgazzar. 1-6 [doi]
- Object-Based Tree Stump Detection Fusing RGB and Multispectral DataPranisha Chaturvedi, Maximilian Johenneken, Ahmad Drak, Sebastian Houben, Alexander Asteroth. 1-6 [doi]
- Blockchain-based Identity and Access Management in a Community CloudRodrigue N'goran, Jean-Louis Tetchueng, Yvon Kermarrec, Aguié Pacôme Bertrand Brou, Olivier Asseu. 1-6 [doi]
- Extending Functionality of ERP Systems with IoT DataRuben Picek, Lovro Posaric, Darko Androcec. 1-6 [doi]
- Direct Time Domain Calculation of Near Field Generated by a Straight Thin Wire in Free SpaceDragan Poljak, Sinisa Antonijevic, Vicko Doric. 1-4 [doi]
- Design of Circular Dual-Band Six-Elements Dipole Array for Omnidirectional Radiation PatternSaber Dakhli, Jean-Marie Floc'h, Hatem Rmili. 1-4 [doi]
- Exploring Student Engagement in Online Programming Courses: A Two-Level K-means AnalysisIvan Peraic, Ani Grubisic. 1-6 [doi]
- A Localisation and Telemetry LoRa Node for RocketsMarta Brzynska, Krzysztof Klimaszewski, Krzysztof Martin. 1-6 [doi]
- Performance Optimization in Transition Toward Open Industrial Control SystemsMladen Sverko, Tihana Galinac Grbac, Darko Huljenic. 1-6 [doi]
- Exploring the Capabilities of Professionals and Agile Teams: An Updated ReviewFelipe Cunha, Mirko Barbosa Perkusich, Everton Guimarães, Ramon Nóbrega dos Santos, Thiago Rique, Danyllo Albuquerque, Angelo Perkusich, Hyggo O. Almeida, Kyller Costa Gorgônio. 1-6 [doi]
- Testing the First Hungarian CV-QKD System on a Real Optical LineBotond L. Márton, Zsolt Kis, László Bacsárdi. 1-6 [doi]
- Securing D2D Therapeutic Hiking Group in 5G Networks for Partial Coverage ScenarioSalah Zemmoudj, Nabila Bermad. 1-6 [doi]
- Radio Frequency-Based Drone Detection and Classification using Deep Learning AlgorithmsRaluca Nelega, Romulus Valeriu Flaviu Turcu, Bogdan Belean, Emanuel Puschita. 1-6 [doi]
- Trust Analysis to Identify Malicious Nodes in the Social Internet of ThingsRaza Ul-Mustafa, Alan McGibney, Susan Rea. 1-9 [doi]
- Towards a German National Education PlatformKsenia Neumann, Damanpreet Singh Walia, Daniel Staegemann, Robert Häusler, Stefan Weidner, Klaus Turowski. 1-6 [doi]
- Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge ComputingSarra Khaber, Ryma Boussaha, Yacine Challal. 1-6 [doi]
- Towards the Adoption of a Plugable Architecture for Network Features VisualizationGian Paolo Jesi, Andrea Odorizzi, Gianluca Mazzini. 1-5 [doi]
- High-Precision Round-Trip Time Measurements in the Internet with HiPerConTracerThomas Dreibholz. 1-7 [doi]
- Dynamically Predicting Wi-Fi Coverage Mapping Using Bioinspired Neural NetworksAyrat Nurutdinov, Rustam Latypov. 1-6 [doi]
- Adoption of Two-Factor Authentication in a Pre-Existing Heterogeneous SystemElisa Benetti, Simone Sapori, Gianluca Mazzini. 1-6 [doi]
- The Influence of HF Wireless Power Transmitter on nearby Thin-Wire Objects: A Simplified Analytical ModelPetra Rasic, Zoran Blazevic, Dragan Poljak. 1-5 [doi]
- Wideband Spectrum Sensing Utilizing Cumulative Distribution Function and Machine LearningJakub Nikonowicz, Mieczyslaw Jessa. 1-6 [doi]
- Steering Angle Prediction Algorithm Performance Comparison in Different Simulators for Autonomous DrivingDavid Dumancic, David Mijic, Mario Vranjes, Ratko Grbic. 1-7 [doi]
- Neural Networks to Predict Software Development/Maintenance Performance and Required TimeMatej Plugel, Domagoj Tolic. 1-6 [doi]
- Flexible, Robust, Scalable Solution to Extract Information from IoT Public Network SensorsStefania Nanni, Massimo Carboni, Gianluca Mazzini. 1-5 [doi]
- Challenges for Conflict Mitigation in O-RAN's RAN Intelligent ControllersCezary Adamczyk. 1-6 [doi]
- An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge ComputingSomia Bibi, Chafiq Titouna, Faiza Titouna, Farid Naït-Abdesselam. 1-6 [doi]
- SDN-based Port Hopping Technique for Mitigating Network AttacksJoseph Henry Anajemba, Nedal Ababneh, Yasir Hamid, Atif Chowhan, Otuu Obinna, Emir Vajzovic. 1-6 [doi]
- An Overview of Machine Learning-Enabled Network Softwarization for the Internet of ThingsMohamed Ali Zormati, Hicham Lakhlef. 1-6 [doi]
- Use of ChatGPT as Configuration Support Tool and Network AnalysisStella Azevedo Marques, Demóstenes Zegarra Rodríguez, Renata Lopes Rosa. 1-6 [doi]
- A Framework Proposal for Early Cyber Threat Identification and ProfilingRenato Marinho, Raimir Holanda Filho. 1-7 [doi]
- The Transfer Learning-Based Approach for Electromagnetic Signal Classification Using Simulated HGCAL DataMarina Prvan, Arijana Burazin Misura, Vesna Pekic, Josip Music. 1-6 [doi]
- A Novel Resource Allocation in Software-Defined Networks for IoT ApplicationAlexandre Ladeira de Sousa, Ogobuchi Daniel Okey, Renata Lopes Rosa, Muhammad Saadi, Demóstenes Zegarra Rodríguez. 1-5 [doi]
- Design of a 3D Printed Humanoid Robotic HandIvan Chavdarov, Ivaylo Georgiev, Bozhidar Naydenov, Valentin Nikolov. 1-6 [doi]
- A Deep Intrusion Detection Model for Network Traffic Payload AnalysisSina Hojjatinia, Mehrnoosh Monshizadeh, Vikramajeet Khatri. 1-7 [doi]
- Embedding Delay-Constrained VNF Forwarding Graphs into Reconfigurable WDM Optical NetworksValentin Kirchner, Holger Karl. 1-6 [doi]
- Signal Processing Based Antenna Pattern Characterization for MIMO SystemsChandan Kumar Sheemar, Jorge Querol, Symeon Chatzinotas. 1-5 [doi]
- Evolved Cold-Potato Routing PracticesJan Marius Evang, Tarik Cicic. 1-6 [doi]
- High-Baudrate SiP and InP Modulators for Data Center InterconnectsOskars Ozolins, Armands Ostrovskis, Toms Salgals, Benjamin Krüger 0001, Fabio Pittalà, Mahdieh Joharifar, Richard Schatz, Michael Koenigsmann, Yuchuan Fan, Urban Westergren, Haïk Mardoyan, Lu Zhang 0051, Sandis Spolitis, Xianbin Yu, Markus Gruen, Vjaceslavs Bobrovs, Hadrien Louchet, Xiaodan Pang. 1-3 [doi]
- An IDS for DDoS Attacks in SDN using VGG-Based CNN ArchitectureMamdouh Muhammad, Abdullah S. Alshra'a, Reinhard German. 1-7 [doi]
- Dynamic Images Comparison using Siamese Neural NetworkDomagoj Steiner, Mario Vranjes, Matija Pul, Marijan Herceg. 1-6 [doi]
- Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management SystemsSeyedeZahra Chamideh, William Tärneberg, Maria Kihl. 1-6 [doi]
- A Novel Distance Estimation Framework for PDR Based Indoor Localization Using RNNsAyinala Likhith, M. P. R. S. Kiran. 1-6 [doi]
- 5G Networks Supported by UAVs, RESs, and RISsAdam Samorzewski, Adrian Kliks. 1-6 [doi]
- WEKA-based Real-Time Attack Detection for VANET SimulationsYasmine Chaouche, Éric Renault, Ryma Boussaha. 1-6 [doi]
- Automatic Dependency Tracking in Microservice-based Systems Using Static Analysis in Helm ChartsAnett Fekete, Benedek Kovács, Zoltán Porkoláb. 1-7 [doi]
- Implementation of Sequential Detection of Replay Attacks for a Cloud Native ControllerSinchan Biswas, Fatemeh Akbarian, Maria Kihl. 1-6 [doi]
- Exploring Student Persistence with Automatically Generated Practice through Interaction PatternsRachel Van Campenhout, Michelle W. Clark, Jeffrey S. Dittel, Nick Brown, Richard Benton, Benny G. Johnson. 1-6 [doi]
- Asymmetric Byzantine Quorum Approach to Resolve Trust Issues in Decentralized Blockchain OraclesFahad Rahman, Chafiq Titouna, Farid Naït-Abdesselam. 1-6 [doi]
- An Efficient Emergency Messages Dissemination for Hybrid Sensor and Vehicular NetworksRebiha Souadih, Fouzi Semchedine. 1-6 [doi]
- A Strategy to Improvise Coin-age Selection in the Proof of Stake Consensus AlgorithmHarshavardhan Netha Gurram, Hafeez Mohamad, Abhinav Sriram, Anjaneyulu Endurthi. 1-4 [doi]
- Evaluating Interactive Detection of Code Smells on Software Development ActivitiesDanyllo Albuquerque, Everton Guimarães, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich. 1-6 [doi]
- Distributed Asynchronous Protocol for Service Provisioning in the Edge-Cloud ContinuumItamar Cohen, Paolo Giaccone, Carla-Fabiana Chiasserini. 1-6 [doi]
- Axial Ratio of Quarter- and Half-wavelength Cloverleaf Antenna for Drone FPV ApplicationsMaja Skiljo, Marina Udzenija, Zoran Blazevic. 1-5 [doi]
- Unified Approach to Video-Based AI Inference Tasks in Augmented Reality Systems Assisted by Mobile Edge ComputingAlexandre Ladeira de Sousa, Ogobuchi Daniel Okey, Renata Lopes Rosa, Muhammad Saadi, Demóstenes Zegarra Rodríguez. 1-5 [doi]
- Reordering-Less FFT: A Novel FFT Processor with Parallel Input/Output in Normal OrderMojtaba Mahdavi 0001. 1-6 [doi]
- Guard Interval's Length Prediction in 802.11ay Systems in Indoor EnvironmentsMonika Drozdowska, Narcís Cardona. 1-5 [doi]
- EEG Signal Analysis Approaches for Epileptic Seizure Event Prediction Using Deep LearningChrisa Samara, Eleni Vrochidou, George A. Papakostas. 1-7 [doi]
- An Approach for Integrating Interactive Detection of Code Smells on Agile Software DevelopmentDanyllo Albuquerque, Everton Guimarães, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich. 1-6 [doi]
- Performance of Config-as-Code Git RepositoriesPéter Hegyi, Nándor Galambosi, Péter Fazekas. 1-7 [doi]
- Learning-Based Infrastructure To Vehicle Link Quality EstimationRaoua Chakroun, Thierry Villemur, Kokouvi Bénoît Nougnanke. 1-6 [doi]
- Dynamic Optimization of Provider-Based Scheduling for HPC WorkloadsJacopo Marino, Fulvio Risso, Mauro Bighi. 1-6 [doi]
- QoE-Driven Coding Bitrate Determination for Adaptive Video Streaming to Home ViewersJanusz Klink. 1-6 [doi]
- Numerical Filtering of Electric Field in Human Head Models Exposed to High-Frequency EMFMario Cvetkovic, Dragan Poljak, Hrvoje Dodig. 1-6 [doi]
- SeReIn: Smart Home Sensor Relationship InferenceSamuel Nack, Razib Iqbal, Siming Liu 0001. 1-6 [doi]
- Driver Monitoring System using an Embedded Computer PlatformRajesh Rimal, Marijan Herceg, Mario Vranjes, Ratko Grbic. 1-7 [doi]
- Demonstration of QKD Integration into 5G Campus NetworkPatrik Burdiak, Lukas Kapicak, Libor Michalek, Emir Dervisevic, Miralem Mehic, Miroslav Voznák. 1-4 [doi]
- Estimating Power Consumption of Collocated Workloads in a Real-World Data CenterPritam Jaywant Chaudhari, Satoshi Kaneko, Taku Okamura. 1-7 [doi]
- ATSC 3.0 Constellation Analysis using Computer Vision Combined with AI Decision TreeJefferson Jesus Hengles Almeida, Paulo Batista Lopes, Cristiano Akamine. 1-5 [doi]